Search Results

All Results 437
Resource Type
Applicable Versions
Deployment Approach
Capability
Feature
Commerce Roles and Permissions
Commerce Roles and Permissions The permissions assigned to a user role determine the Liferay applications and resources they can access and use. You can scope each role to an instance, site,...
Using Organizations to Create a Sales Network
Using Organizations to Create a Sales Network The organizational structure of B2B sales networks can be mirrored in Liferay Commerce using the Organizations feature. Organizations are hierarchical...
Pricing Permissions
Pricing Permissions With Liferay Commerce, you can use permissions to control access to Pricing applications and resources in the Commerce tab of the Global Menu (Global Menu). Control access to...
Settings Permissions
Settings Permissions With Liferay Commerce, you can use permissions to control access to Settings applications in the Commerce tab of the Global Menu (Global Menu). Control access to Settings...
Store Management Permissions
Store Management Permissions With Liferay Commerce, you can use permissions to control access to Store Management applications and resources in the Commerce tab of the Global Menu (Global Menu). ...
Inventory Management Permissions
Inventory Management Permissions With Liferay Commerce, you can use permissions to control access to Inventory Management applications and resources in the Commerce tab of the Global Menu (Global...
Product Management Permissions
Product Management Permissions With Liferay Commerce, you can use permissions to control access to Product Management applications and resources in the Commerce tab of the Global Menu (Global...
Order Management Permissions
Order Management Permissions With Liferay Commerce, you can use permissions to control access to Order Management applications and resources in the Commerce tab of the Global Menu (Global Menu). ...
Audit Configuration Reference
Audit Configuration Reference Configuration settings for audits are available at a system scope. You can find these settings by opening the Global Menu (Global Menu) and navigating to Control Panel...
Audit Framework
Audit Framework Liferay's audit framework shows activities relating to users, user groups, organizations, roles, multi-factor authentication, and objects (definitions, fields, actions, layouts,...
Searching and Exporting Audit Events
Searching and Exporting Audit Events The audit application comes with simple and advanced searching capabilities. To use the simple search, you can enter a search term and click the magnifying...
Configuring Liferay
Configuring Liferay Liferay is a very adaptable tool. You can modify and configure it to suit the needs of your application.
Security Settings
Security Settings Enabling Antivirus Scanning for Uploaded Files More coming soon!
User Authentication
User Authentication The User Authentication settings define how Users can authenticate, the various authentication methods that are required for them, and the screen names and email addresses that...
Setting Up CORS
Setting Up CORS CORS stands for Cross-Origin Resource Sharing. An Origin is a web server at a different domain, and a Resource is some asset stored on the server, like an image, PDF, or HTML file....
Using Authentication Verifiers
Using Authentication Verifiers Authentication Verifiers authenticate remote invocations of Liferay Portal's API in a centralized and extensible way. They have two main responsibilities: Verify...
Securing Web Services
Securing Web Services Liferay DXP provides four security layers for web services: IP permission layer: The IP address from which a web service invocation request originates must be white-listed in...
Setting Service Access Policies
Setting Service Access Policies Service Access Policies define what services or service methods can be invoked remotely. You can apply many of them at once to produce a combined effect. They are...
System for Cross-domain Identity Management (SCIM)
System for Cross-domain Identity Management (SCIM) Liferay DXP 2024.Q1+ System for Cross-domain Identity Management or SCIM, is an open standard that automates user provisioning. In other words,...
Configuring Content Security Policy Headers
Configuring Content Security Policy Headers Modern browsers use Content Security Policy HTTP response headers to enhance web pages' security to mitigate certain types of attacks (like Cross-Site...